Verder naar navigatie
Doorgaan naar hoofdinhoud
Ga naar de voettekst
Fox-IT
Menu
Onze oplossingen
Open submenu voor Onze oplossingen
Assessment & Advisory
Assessment & Advisory
Risk Management
Supply Chain Risk
Cloud & Infrastructure
Application & Software
Mobile
Vulnerability Scanning
Hardware & Embedded Systems
Detection & Response
Detection & Response
Managed Detection & Response (MDR)
Incident Response
Threat Intelligence
Compliance
Compliance
Data Privacy
Overheid & regelgevingen
Betalingsbeveiliging
Academy
Academy
Awareness Programma's
Oefeningen & Demonstraties
Trainingen
Trainingsprogramma's
Escode
Escode
Software Escrow
SaaS Escrow
Escrow Agreements
Escrow Verification
Remediation
Remediation
Remediate
Bug Bounty
Uw sectoren
Open submenu voor Uw sectoren
Finance & Professional Services
Technologie, media en telecommunicatie
Transport en productie
Overheid
Retail
Energie- en nutsvoorzieningen
Trainingen
Over ons
Open submenu voor Over ons
Wie wij zijn
Duurzaamheid
Investeerdersrelaties
Vacatures
Resources
Resources
Resource Center
Tech Blog
Newsroom
Global Cyber Policy Radar
The state of supply chain security
Zoeken
BE
Open submenu voor regio's
Nederland
English
België
English
Client login
Open submenu voor Klantportalen
Managed Services Portal
Escrow View
Een zoekterm invoeren
​
Resource Hub
Toon of verberg filters
Filter op type
Resource type
Article (7)
Whitepapers (1)
Webinars (1)
Guides & Datasheets (3)
Case Studies (1)
Onderwerp
Supply Chain Management (3)
Third-Party Risk Management (13)
Regulations & Legislation (1)
Assessments (2)
Ransomware (2)
Legacy Systems (1)
Sector
Financial Services (2)
Healthcare (1)
Public Sector & Government Services (1)
Software Vendors (1)
Filters toepassen
Filters resetten
Article
The Top 5 Cyber Security Concerns for the Healthcare Industry in 2025: Part 1
door
Michael Spotts
21 Jan 2025
Article
How To Navigate DORA Requirements as a Critical Third-Party Provider
door
Paul Robinson
09 Dec 2024
Webinars
Webinar: Securing Your App for Google's API Ecosystem
door
NCC Group
01 Jun 2023
Article
Is a SOC 2 report enough to assess a third-party?
07 Mar 2023
Guides & Datasheets
Third-Party Risk Prioritization Checklist
07 Mar 2023
Whitepapers
Third-Party Risk Management: 5 Characteristics of an Inefficient Program
door
Chris Gida
07 Mar 2023
Guides & Datasheets
Guidance for the Cybersecurity Maturity Model Certification (CMMC)
07 Mar 2023
Article
Why integrated cyber risk management matters to investment management firms (1)
door
James Pearce
16 Dec 2022
Case Studies
Case Study: Using Cyber Security Review in Data Analytics
30 Jun 2022
Article
Reflecting on Cyber Security as a Risk in Private Equity: Three actions
door
Stephanie Lynch-Ozanar
30 May 2022
Meer tonen